Spoofing Attack Detection using the Non-linear Fusion of Sub-band Classifiers

by   Hemlata Tak, et al.

The threat of spoofing can pose a risk to the reliability of automatic speaker verification. Results from the bi-annual ASVspoof evaluations show that effective countermeasures demand front-ends designed specifically for the detection of spoofing artefacts. Given the diversity in spoofing attacks, ensemble methods are particularly effective. The work in this paper shows that a bank of very simple classifiers, each with a front-end tuned to the detection of different spoofing attacks and combined at the score level through non-linear fusion, can deliver superior performance than more sophisticated ensemble solutions that rely upon complex neural network architectures. Our comparatively simple approach outperforms all but 2 of the 48 systems submitted to the logical access condition of the most recent ASVspoof 2019 challenge.


page 1

page 2

page 3

page 4


A Comparative Study of Fusion Methods for SASV Challenge 2022

Automatic Speaker Verification (ASV) system is a type of bio-metric auth...

Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation

The performance of spoofing countermeasure systems depends fundamentally...

Detecting Spoofing Attacks Using VGG and SincNet: BUT-Omilia Submission to ASVspoof 2019 Challenge

In this paper, we present the system description of the joint efforts of...

RawBoost: A Raw Data Boosting and Augmentation Method applied to Automatic Speaker Verification Anti-Spoofing

This paper introduces RawBoost, a data boosting and augmentation method ...

Ensemble Models for Spoofing Detection in Automatic Speaker Verification

Detecting spoofing attempts of automatic speaker verification (ASV) syst...

IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks

Face liveness detection has become a widely used technique with a growin...

AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks

Artefacts that differentiate spoofed from bona-fide utterances can resid...